Advertisement

Formal Security Verification of Secured ECC Based Signcryption Scheme

  • Atanu Basu
  • Indranil Sengupta
  • Jamuna Kanta Sing
Part of the Advances in Intelligent Systems and Computing book series (volume 167)

Abstract

The signcryption scheme is a primitive in public key cryptography and it is useful where privacy and authenticity are required simultaneously. Our proposed Elliptic Curve Cryptography (ECC) based signcryption scheme preserves all the basic security features with lower overheads like authentication, confidentiality, non-repudiation, unforgeability, forward secrecy as well as public verifiability feature. We have showed through formal security analysis that our proposed scheme is secured against any adversary. The proposed scheme has been implemented in AVISPA, a well-known formal verification tool and the simulation results show that the proposed scheme is secured against any intruder attack.

Keywords

Signcryption unsigncryption elliptic curve cryptography ECDLP adversary AVISPA 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar
  2. [2]
    Zheng, Y., Imai, H.: How to construct efficient signcryption schemes on elliptic curves. Information Processing Letters 68(5), 227–233 (1998)MathSciNetCrossRefGoogle Scholar
  3. [3]
    Peng, C., Xiang, L.: Threshold Signcryption Scheme Based on Elliptic Curve Cryptosystem and Verifiable Secret Sharing. In: International Conference on Wireless Communications, Networking and Mobile Computing, vol. 2, pp. 1182–1185 (September 2005)Google Scholar
  4. [4]
    Hwang, R.-J., Lai, C.-H., Su, F.-F.: An Efficient Signcryption Scheme With Forward Secrecy Based on Elliptic Curve. Applied Mathematics and Computation 167(2), 870–881 (2005)MathSciNetMATHCrossRefGoogle Scholar
  5. [5]
    Baek, J., Steinfeld, R., Zheng, Y.: Formal Proofs for the Security of Signcryption. Journal of Cryptology 20(2), 203–235 (2007)MathSciNetMATHCrossRefGoogle Scholar
  6. [6]
    Zhou, X.: Improved Signcryption Scheme with Public Verifiability. In: Pacific-Asia Conference on Knowledge Engineering and Software Engineering, pp. 178–181. IEEE (2009)Google Scholar
  7. [7]
    Basu, A., Sengupta, I., Sing, J.K.: Secured Hierarchical secret Sharing using ECC based Signcryption. In: Security and Communication Networks. Wiley (to appear)Google Scholar
  8. [8]
    Basu, A., Sengupta, I., Sing, J.K.: Cryptosystem for secret sharing scheme with hierarchical groups. International Journal of Network Security (to appear)Google Scholar
  9. [9]
    Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer (2004)Google Scholar
  10. [10]
    Vanstone, S.A.: Elliptic curve cryptosystem - The Answer to Strong, Fast Publickey Cryptography for Securing Constrained Environments. Information Security Technical Report 12(2), 78–87 (1997)CrossRefGoogle Scholar
  11. [11]
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Pearson Prentice Hall (2006)Google Scholar
  12. [12]
    Hasegawa, T., Nakajima, J., Matsui, M.: A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 182–194. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  13. [13]
    Chuang, Y.-H., Tseng, Y.-M.: An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management 20(4), 167–180 (2010)Google Scholar
  14. [14]
    Dutta, R., Barua, R.: Provably Secure Constant Round Contributory Group Key Agreement. IEEE Transactions on Information Theory 54(5), 2007–2025 (2008)MathSciNetCrossRefGoogle Scholar
  15. [15]
    AVISPA Project. AVISPA protocol library, http://www.avispa-project.org/
  16. [16]
    Vigano, L.: Automated Security Protocol Analysis With the AVISPA Tool. Electronic Notes in Theoretical Computer Science, vol. 155, pp. 61–86. Elsevier (2006)Google Scholar
  17. [17]
    Dolev, D., Yao, A.C.-C.: On the security of public key protocols. In: FOCS, pp. 350–357. IEEE (1981)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Atanu Basu
    • 1
  • Indranil Sengupta
    • 1
  • Jamuna Kanta Sing
    • 2
  1. 1.Department of Computer Science and EngineeringIndian Institute of TechnologyKharagpurIndia
  2. 2.Department of Computer Science and EngineeringJadavpur UniversityKolkataIndia

Personalised recommendations